Subscribe to our Threatpost Today newsletter

Join thousands of people who receive the latest breaking cybersecurity news every day.

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

*

*

I agree to my personal data being stored and used to receive the newsletter

*

I agree to accept information and occasional commercial offers from Threatpost partners

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

A Reuters social media editor on Thursday was charged with helping hackers break into the Tribune Co.’s network shortly after he was fired from a Sacramento television station in Fall 2010.

A U.S. Eastern District grand jury in Sacramento handed down a three-count indictment against Matthew Keys, 26, of Secaucas, N.J., for conspiracy to transmit information to damage a protected computer and transmitting or attempting to transmit that information. The combined counts carry a potential penalty of 25 years’ imprisonment and $750,000 in fines.

UPDATE — One of Matthew Keys’ lawyers told The Huffington Post on Friday that his client was working as an “undercover” journalist when he engaged members of Anonymous in an IRC channel offering login credentials for Tribune Co. servers.

Keys, 26, of Secaucas, N.J., was suspended with pay from Reuters news service on Thursday after the social media editor was charged with helping hackers break into the Tribune Co.’s network shortly after he was fired from a Sacramento television station in Fall 2010.

Two days after the group Anonymous boasted it had broken into a government Web site and had the data dump to prove it, the U.S. Federal Reserve admitted it was hacked.”The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product,” a spokeswoman told Reuters Tuesday. “Exposure was fixed shortly after discovery and is no longer an issue. This incident did not affect critical operations of the Federal Reserve system.”

Hacktivist collective Team Ghostshell is claiming this morning to have spilled 1.6 million accounts from a handful of companies in the aerospace, nanotechnology, banking, law, education and government realm, a hack the group deems Project White Fox.The group claims White Fox is its “final stand” this year in a lengthy diatribe posted to Pastebin. The post goes on about internet freedom, espionage and trolling before addressing the actual leak.

Websites belonging to British bank and financial services company HSBC are back online today after reportedly experiencing a denial of service (DoS) attack. The attack, which lasted approximately 10 hours last night, was deemed a “large scale denial of service attack” by the company.

Several Web sites in Sweden, including the nation’s central bank and two government affiliates, were hit with attacks this week, supposedly in retaliation for a police raid on an Internet company tied to The Pirate Bay, the world’s largest file sharing site.That site also was offline until Wednesday, but its officials say it was due to broken Power Distribution Unit.

Lashing out against what they believe is a hopelessly broken international education system, the hacker collective Team Ghostshell published some 120,000 records from a number of the world’s top universities.

The National Telecommunications Commission (NTC) of the Philipines has asked for assistance from law enforcement after a handful of government sites in the country, including the NTC’s site, were brought offline this morning in a hack allegedly carried out by PrivateX, an offshoot of the hacktivist group Anonymous.

Authors

Threatpost

InfoSec Insider Post

InfoSec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.

Sponsored

Sponsored Post

Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.